The following pages link to Theory of Cryptography (Q5711654):
Displayed 25 items.
- Attacks on quantum key distribution protocols that employ non-ITS authentication (Q265393) (← links)
- How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\) (Q268461) (← links)
- Study on the security of the authentication scheme with key recycling in QKD (Q331437) (← links)
- Trojan horse attack free fault-tolerant quantum key distribution protocols using GHZ states (Q332568) (← links)
- An integrated hierarchical dynamic quantum secret sharing protocol (Q747847) (← links)
- New probabilistic quantum key distribution protocol (Q1740828) (← links)
- Everlasting multi-party computation (Q1994636) (← links)
- Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis (Q2007718) (← links)
- Controlled probabilistic quantum key distribution using a ground state (Q2018220) (← links)
- Composable and finite computational security of quantum message transmission (Q2175915) (← links)
- Asymmetric cyclic controlled quantum teleportation by using nine-qubit entangled state (Q2239758) (← links)
- Cryptanalysis of multi-user quantum private query protocol (Q2241013) (← links)
- Quantum private comparison with a malicious third party (Q2355616) (← links)
- Differential phase encoded measurement-device-independent quantum key distribution (Q2687107) (← links)
- Optimizing the decoy-state BB84 QKD protocol parameters (Q2690312) (← links)
- The Locking-Decoding Frontier for Generic Dynamics (Q3453310) (← links)
- Quantum Cryptography: Key Distribution and Beyond (Q5134949) (← links)
- Finite-key security analysis of quantum key distribution with imperfect light sources (Q5136090) (← links)
- Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths (Q5137709) (← links)
- Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths (Q5143230) (← links)
- Discrete-phase-randomized coherent state source and its application in quantum key distribution (Q5144007) (← links)
- Robustness and device independence of verifiable blind quantum computing (Q5151595) (← links)
- Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought) (Q5271780) (← links)
- Security Bounds for Quantum Cryptography with Finite Resources (Q5503299) (← links)
- Multi-partite squash operation and its application to device-independent quantum key distribution (Q5855111) (← links)